• Title/Summary/Keyword: Weaknesses

Search Result 1,178, Processing Time 0.028 seconds

A Design and Implementation for Dynamic Relocate Algorithm Using the Binary Tree Structure (이진트리구조를 이용한 동적 재배치 알고리즘 설계 및 구현)

  • 최강희
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.6
    • /
    • pp.827-836
    • /
    • 2001
  • Data is represented by file structure in Computer System. But the file size is to be larger, it is hard to control and transmit. Therefore, in recent years, many researchers have developed new algorithms for the data compression. And now, we introduce a new Dynamic Compression Technique, making up for the weaknesses of huffman's. The huffman compression technique has two weaknesses. The first, it needs two steps of reading, one for acquiring character frequency and the other for real compression. The second, low compression rate caused by storing tree information. These weaknesses can be solved by our new Dynamic Relocatable Method, reducing the reading pass by relocating data file to dynamic form, and then storing tree information from pipeline structure. The first, it needs two steps of reading, one for acquiring character frequency and the other for real compression. The second, low compression rate caused by storing tree information. These weaknesses can be solved by our new Dynamic Relocatable Method, reducing the reading pass by relocating data file to dynamic form, and then storing tree information from pipeline structure.

  • PDF

Chinese Construction Market for Foreign Construction Enterprises using SWOT

  • Zhi, Wang En;Woo, Moon Sung
    • Journal of Construction Engineering and Project Management
    • /
    • v.4 no.2
    • /
    • pp.23-30
    • /
    • 2014
  • The remarkable growth of China's economy over the past several decades has obtained tremendous achievements. The construction industry play a leading role un this rapid economic expansion. And China's huge construction market gives it great economic influence around the world, it has attracting many enterprises to entry, although many enter barriers and market risks exist. However many construction enterprises have not doing well, especially foreign construction enterprises are not doing as well as we thought in the Chinese construction market. Although China's construction market has great development and become increasingly open, foreign investors and contractors now have much broader access to the Chinese construction market than before. But nonetheless, there are a wide range of practical problems that bring potential risks for them to invest in China. This paper aims to identify foreign construction enterprises' position by understanding the local market environment, and adopt he SWOT analysts Identifies the foreign construction enterprises' strengths, weaknesses, opportunities, and threats in the Chinese construction market, to Proposes appropriate Strengths-Opportunities (SO), Weaknesses-Opportunities (WO), Strengths-Threats (ST) and Weaknesses-Threats (WT) strategies to make the foreign construction enterprises movling forward.

Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software (전자정부 소프트웨어의 보안약점 진단도구 평가방법론)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.335-343
    • /
    • 2013
  • If the SW weaknesses, which are the main cause of cyber breaches, are analyzed and removed in the SW development stages, the cyber breaches can be prevented effectively. In case of Domestic, removing SW weaknesses by applying Secure SDLC(SW Development Life Cycle) has become mandatory. In order to analyze and remove the SW weaknesses effectively, reliable SW weakness diagnostic tools are required. Therefore, we propose the functional requirements of diagnostic tool which is suitable for the domestic environment and the evaluation methodology which can assure the reliability of the diagnostic tools. Then, to analyze the effectiveness of the proposed evaluation framework, both demonstration results and process are presented.

An Empirical Evaluation of Test Data Generation Techniques

  • Han, Seung-Hee;Kwon, Yong-Rae
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.3
    • /
    • pp.274-300
    • /
    • 2008
  • Software testing cost can be reduced if the process of testing is automated. However, the test data generation task is still performed mostly by hand although numerous theoretical works have been proposed to automate the process of generating test data and even commercial test data generators appeared on the market. Despite prolific research reports, few attempts have been made to evaluate and characterize those techniques. Therefore, a lot of works have been proposed to automate the process of generating test data. However, there is no overall evaluation and comparison of these techniques. Evaluation and comparison of existing techniques are useful for choosing appropriate approaches for particular applications, and also provide insights into the strengths and weaknesses of current methods. This paper conducts experiments on four representative test data generation techniques and discusses the experimental results. The results of the experiments show that the genetic algorithm (GA)-based test data generation performs the best. However, there are still some weaknesses in the GA-based method. Therefore, we modify the standard GA-based method to cope with these weaknesses. The experiments are carried out to compare the standard GA-based method and two modified versions of the GA-based method.

Validation Test Codes Development of Static Analysis Tool for Secure Software (안전한 소프트웨어 개발을 위한 정적분석 도구 시험코드 개발)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.420-427
    • /
    • 2013
  • Recently, for secure software development, static analysis tools have been used mostly to analyze the source code of the software and identify software weaknesses caused of vulnerabilities. In order to select the optimal static analysis tool, both weaknesses rules and analysis capabilities of the tool are important factors. Therefore, in this paper we propose the test codes developed for evaluating the rules and analysis capabilities of the tools. The test codes to involve 43 weaknesses such as SQL injection etc. can be used to evaluate the adequacy of the rules and analysis capabilities of the tools.

Proposal and Simulation of Flow Control and Error Recovery in EAP for Performance Improvement (EAP 성능 향상을 위한 흐름 제어 및 오류 복구 방식의 제안과 시뮬레이션)

  • Cha, Eun-Chul;Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.299-306
    • /
    • 2009
  • Followed by the popularity of the Internet, a number of access technologies to the Internet have been developed. EAP is an authentication framework. It is designed to provide the authentication functionality in the access network. Because of its flexibility and extensibility EAP poses a global solution for the authentication supported by many access networks. However, EAP has critical weaknesses in the protocol which may, in turn, decrease the EAP performance. Some of the weaknesses are caused by the "lock-step" flow control which only supports a single packet in flight. Considering the weaknesses, we propose a solution for the flow control. Using simulation we prove that our solutions improve the EAP performance.

Vulnerability Analysis and Development of Secure Coding Rules for PHP (PHP 보안 취약점 분석과 시큐어 코딩 규칙 개발)

  • Han, KyungSook;Park, Wooyeol;Yang, Ilgwon;Son, Changhwan;Pyo, Changwoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.11
    • /
    • pp.721-726
    • /
    • 2015
  • This paper shows secure coding rules for PHP programs. Programmers should comply with these rules during development of their programs. The rules are crafted to restrain 28 weaknesses that are composed of 22 corresponding to reported CVEs of PHP, the children of CWE-661 for PHP, and the top 5 weaknesses according to OWASP. The rule set consists of 28 detailed rules under 14 categories. This paper also demonstrates through examples that programs complying with these rules can curb weaknesses. The rules can also serve as a guideline in developing analysis tools for security purposes.

Preliminary Analysis on Strategic Planning to Enter Chinese health Care Market: Focusing on SWOT-AHP Analysis (중국 의료시장 진출 전략 기획을 위한 기초 분석 연구: SWOT과 AHP 분석기법을 중심으로)

  • Lee, Ye-Seol;Kim, Tae-Hyun
    • The Korean Journal of Health Service Management
    • /
    • v.12 no.4
    • /
    • pp.127-138
    • /
    • 2018
  • Objectives: The purpose of this study was to identify the intrinsic strengths and weaknesses, as well as opportunities for success and threats of Korean health care industry when planning strategies to enter Chinese health care market. Methods: To suggest directions for planning the strategies, a SWOT(Strengths, Weaknesses, Opportunities, Threats) analysis was used in combination with an AHP(Analytic Hierarchy Process) in this study. A total of twenty SWOT factors and the relative weight of SWOT groups were examined through a survey on the respondents who have work experiences in the area of entering Chinese market. Results: "Geographical proximity between Korea and China" was recognized as a key strength. "Absence of success case in medical service industry" was selected as a critical weakness. "Increase in demand for advanced medical services in China" was identified as an important opportunity. "Difficulty in establishing Korea-China partnership" was considered as a major threat. The respondents prioritized weaknesses, followed by threats, opportunities, and strengths when conducting strategic planning to enter Chinese health care market. Conclusions: Improving local hospital management plan as well as specializing in certain health care services may be necessary.

Developing a Job Exposure Matrix of Work Organization Hazards in the United States: A Review on Methodological Issues and Research Protocol

  • Choi, BongKyoo
    • Safety and Health at Work
    • /
    • v.11 no.4
    • /
    • pp.397-404
    • /
    • 2020
  • Background: Most job exposure matrices (JEMs) have been developed for chemical and physical hazards in the United States (US). In addition, the overall validity of most JEMs of work organization hazards using self-reported data in the literature remains to be further tested due to several methodological weaknesses. Methods: This paper aims to review important methodological issues with regard to a JEM of work organization hazards using self-report data and to present a research protocol for developing a four-axis (job titles, hazards, sex, and time) JEM of major work organization hazards using the US General Social Survey-Quality of Work-Life (GSS-QWL) data (2002-2018; N = 7,100 workers). Results: Five methodological weaknesses in existing JEMs of work organization hazards using self-report data were identified: having only two axes (hazard and occupation), using psychometrically weak items and scales, including scales having little interoccupational variability, unresolved optimal minimum numbers of subjects per occupation, and low accessibility. The methodological weaknesses were successfully addressed in the proposed research protocol. Conclusion: The work organization JEM to be developed will significantly facilitate and strengthen occupational epidemiological studies on work organization hazards and major health outcomes, improve national and occupational surveillance of work organization hazards, and promote interventions for a healthy work environment in the US.

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.